메뉴 건너뛰기




Volumn 1, Issue 4, 2003, Pages 15-23

Computer forensics education

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER FORENSICS; MEDIA ANALYSIS; NETWORK FORENSICS; NETWORK TRAFFIC;

EID: 3042745245     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSECP.2003.1219052     Document Type: Review
Times cited : (78)

References (12)
  • 1
    • 0033295914 scopus 로고    scopus 로고
    • Intrusion detection systems as evidence
    • P. Sommer, "Intrusion Detection Systems as Evidence," Computer Networks, vol. 31, nos. 23-24, 1999, pp. 2477-2487.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2477-2487
    • Sommer, P.1
  • 4
    • 84876121932 scopus 로고    scopus 로고
    • What is forensic computing
    • Australian Inst. of Criminology
    • R. McKemmish, "What Is Forensic Computing," Trends and Issues in Crime and Criminal Justice, no. 118, Australian Inst. of Criminology; www.aic.gov.au/publications/tandi/index3.html.
    • Trends and Issues in Crime and Criminal Justice , Issue.118
    • McKemmish, R.1
  • 5
    • 3242849223 scopus 로고    scopus 로고
    • Integrating security into the curriculum
    • C.E. Irvine, S.-K. Chin, and D.A. Frincke, "Integrating Security into the Curriculum," Computer, vol. 31, no. 12, 1998, pp. 25-30.
    • (1998) Computer , vol.31 , Issue.12 , pp. 25-30
    • Irvine, C.E.1    Chin, S.-K.2    Frincke, D.A.3
  • 9
    • 0035995871 scopus 로고    scopus 로고
    • Security in the information systems curriculum: Identification & status of relevant issues
    • J.E. Anderson and P.H. Schwager, "Security in the Information Systems Curriculum: Identification & Status of Relevant Issues," J. Computer Information Systems, vol. 32, no. 3, 2002, pp. 16-24.
    • (2002) J. Computer Information Systems , vol.32 , Issue.3 , pp. 16-24
    • Anderson, J.E.1    Schwager, P.H.2
  • 11
    • 3042825662 scopus 로고    scopus 로고
    • Remembrance of data passed: A study of disk sanitization practices
    • S.L. Garfinkel and A. Shelat, "Remembrance of Data Passed: A Study of Disk Sanitization Practices," IEEE Security & Privacy, vol. 1, no. 1, 2003, pp. 17-27.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.1 , pp. 17-27
    • Garfinkel, S.L.1    Shelat, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.